-
3
-
-
33947177191
-
Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs
-
Teoh, A.B.J.; Goh, A.; Ngo, D.C.L. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 2006, 28, 1892-1901.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Goh, A.2
Ngo, D.C.L.3
-
4
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Ratha, N.K.; Chikkerur, S.; Connell, J.H.; Bolle, R.M. Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 2007, 29, 561-572.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
5
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
Minneapolis, MN, USA, 18-23 June
-
Boult, T.E.; Scheirer, W.J.; Woodworth, R. Revocable Fingerprint Biotokens: Accuracy and Security Analysis. In Proceedings of IEEE International Conference on Computer Visionand Pattern Recognition, Minneapolis, MN, USA, 18-23 June 2007.
-
(2007)
Proceedings of IEEE International Conference on Computer Visionand Pattern Recognition
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworth, R.3
-
6
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
Xu, H.; Veldhuis, R.N.J.; Bazen, A.M.; Kevenaar, T.A.M.; Akkermans, T.A.H.M.; Gokberk, B. Fingerprint verification using spectral minutiae representations. IEEE Trans. Inf. Forensics Secur. 2009, 4, 397-409.
-
(2009)
IEEE Trans. Inf. Forensics Secur.
, vol.4
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.N.J.2
Bazen, A.M.3
Kevenaar, T.A.M.4
Akkermans, T.A.H.M.5
Gokberk, B.6
-
7
-
-
78650403067
-
Binary Feature Vector Fingerprint Representation from Minutiae Vicinities
-
Washington, DC, USA, 27-29 September
-
Bringer, J.; Despiegel, V. Binary Feature Vector Fingerprint Representation from Minutiae Vicinities. In Proceedings of IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems, Washington, DC, USA, 27-29 September 2010.
-
(2010)
Proceedings of IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems
-
-
Bringer, J.1
Despiegel, V.2
-
8
-
-
78650371034
-
Dynamic random projection for biometric template protection
-
Washington, DC, USA, 27-29 September
-
Yang, B.; Busch, C. Dynamic Random Projection for Biometric Template Protection. In Proceedings of IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems, Washington, DC, USA, 27-29 September 2010.
-
(2010)
Proceedings of IEEE 4th International Conference on Biometrics: Theory, Applications, and Systems
-
-
Yang, B.1
Busch, C.2
-
9
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Preliminary version Adv. Cryptol.-EUROCRYPT 2004 2004, 3027, 523-540
-
Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 2008, 38, 97-139, Preliminary version Adv. Cryptol.-EUROCRYPT 2004 2004, 3027, 523-540.
-
(2008)
SIAM J. Comput.
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
10
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sutcu, Y.; Li, Q.; Memon, N. Protecting biometric templates with sketch: Theory and practice. IEEE Trans. Inf. Forensics Secur. 2007, 2, 503-512.
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
13
-
-
77951799602
-
Biometric template transformation: A security analysis
-
San Jose, USA, 17-21 January
-
Nagara, A.; Nandakumar, K.; Jain, A.K. Biometric Template Transformation: A Security Analysis. In Proceedings of the SPIE Media Forensics and Security, Electronic Imaging, San Jose, USA, 17-21 January 2010.
-
(2010)
Proceedings of the SPIE Media Forensics and Security, Electronic Imaging
-
-
Nagara, A.1
Nandakumar, K.2
Jain, A.K.3
-
15
-
-
84876672622
-
-
EU-FP7 project, Available online, accessed on 21 February
-
EU-FP7 project. Trusted Revocable Biometric Identities. Available online: http://www.turbineproject.eu/ (accessed on 21 February 2012).
-
(2012)
Trusted Revocable Biometric Identities
-
-
-
16
-
-
84855751108
-
-
Available online, accessed on 21 February
-
Simoens, K. TURBINE Security Assessment: How to Build Trust. Available online: http://www.turbine-project.eu/dowloads/Day1.4.3.TURBINE_Workshop_17012011_K.Simoens.pdf (accessed on 21 February 2012).
-
(2012)
TURBINE Security Assessment: How to Build Trust
-
-
Simoens, K.1
-
17
-
-
84876683398
-
-
Available online, accessed on 21 February
-
GUC100 Multi-sensor Fingerprint Database. Available online: http://www.nislab.no/guc100/ (accessed on 21 February 2012).
-
(2012)
GUC100 Multi-sensor Fingerprint Database
-
-
-
19
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
Oakland, CA, USA, 17-20 May
-
Simoens, K.; Tuyls, P.; Preneel, B. Privacy Weaknesses in Biometric Sketches. In Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA, 17-20 May 2009; pp. 188-203.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
20
-
-
79951844995
-
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
-
Kelkboom, E.J.C.; Breebaart, J.; Kevenaar, T.A.M.; Buhan, I.; Veldhuis, R.N.J. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. IEEE Trans. Inf. Forensics Secur. 2011, 6, 107-121.
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, pp. 107-121
-
-
Kelkboom, E.J.C.1
Breebaart, J.2
Kevenaar, T.A.M.3
Buhan, I.4
Veldhuis, R.N.J.5
-
21
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, MD, USA, 11-13 September
-
Scheirer, W.J.; Boult, T.E. Cracking Fuzzy Vaults and Biometric Encryption. In Proceedings of the 2007 Biometrics Symposium, Baltimore, MD, USA, 11-13 September 2007.
-
(2007)
Proceedings of the 2007 Biometrics Symposium
-
-
Scheirer, W.J.1
Boult, T.E.2
-
22
-
-
84873899238
-
The fuzzy vault for fingerprints is vulnerable to brute force attack
-
Darmstadt, Germany, 17-18 September
-
Mihailescu, P.; Munk A.; Tams, B. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. In Proceedings of the BIOSIG 2009, Darmstadt, Germany, 17-18 September 2009; pp. 43-54.
-
(2009)
Proceedings of the BIOSIG 2009
, pp. 43-54
-
-
Mihailescu, P.1
Munk, A.2
Tams, B.3
-
23
-
-
77952047954
-
Extending match-on-card to local biometric identification
-
LNCS 5707
-
Bringer, J.; Chabanne, H.; Kevenaar, T.A.M.; Kindarji, B. Extending Match-On-Card to Local Biometric Identification. In Proceedings of the Biometric ID Management and Multimodal Communication, BioID-Multicomm 2009, LNCS 5707, 2009; pp. 178-186.
-
(2009)
Proceedings of the Biometric ID Management and Multimodal Communication, BioID-Multicomm 2009
, pp. 178-186
-
-
Bringer, J.1
Chabanne, H.2
Kevenaar, T.A.M.3
Kindarji, B.4
-
24
-
-
75749111589
-
Performance evaluation of score level fusion in multimodal biometric systems
-
He, M.; Horng, S.J.; Fan, P.; Run, R.S.; Chen, R.J.; Lai, J.L.; Khan, M.K.; Sentosa, K.O. Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit. 2010, 43, 1789-1800.
-
(2010)
Pattern Recognit
, vol.43
, pp. 1789-1800
-
-
He, M.1
Horng, S.J.2
Fan, P.3
Run, R.S.4
Chen, R.J.5
Lai, J.L.6
Khan, M.K.7
Sentosa, K.O.8
-
25
-
-
4344599787
-
-
Available online, accessed on 21 February
-
Daugman, J. Combining Multiple Biometrics. Available online: http://www.cl.cam.ac.uk/~jgd1000/combine/combine.html/ (accessed on 21 February 2012).
-
(2012)
Combining Multiple Biometrics
-
-
Daugman, J.1
-
26
-
-
0036532848
-
Decision-level fusion in biometric verification
-
Prabhakar, S.; Jain, A.K. Decision-level fusion in biometric verification. Pattern Recognit. 2002, 35, 861-874.
-
(2002)
Pattern Recognit
, vol.35
, pp. 861-874
-
-
Prabhakar, S.1
Jain, A.K.2
-
27
-
-
84876667243
-
-
Available online, accessed on 9 April
-
NIST Fingerprint Image Quality (NFIQ). Available online: http://www.nist.gov/itl/iad/ig/nbis.cfm/ (accessed on 9 April 2012).
-
(2012)
NIST Fingerprint Image Quality (NFIQ)
-
-
|